计算机安全
计算机科学
利用
认证(法律)
连锁
信任锚
工作流程
服务(商务)
互联网
互联网隐私
计算信任
万维网
业务
声誉
数据库
心理治疗师
心理学
社会科学
营销
社会学
作者
Xiaobo Xiang,Zhang Xiu,Qingli Guo,Xiaorui Gong,Baoxu Liu
标识
DOI:10.1109/acctcs58815.2023.00102
摘要
Huawei's 1+8+N strategy is a popular solution for the Internet of Everything. With the introduction of its trust circle authentication mechanism, the security of device- to-device communication is guaranteed to some degree. Despite many security measures adopted in the protocols related to the trust circle service, we still find 0day vulnerabilities. In this work, we conduct a thorough security analysis of the implementation and workflow of Huawei's trust circle service. As a result, we find four 0day vulnerabilities in each of its stages and propose an exploit chain to bypass the "same account" check in the latest HarmonyOS at that time. These vulnerabilities are reported to the vendors, acknowledged and fixed by them in their subsequent releases.
科研通智能强力驱动
Strongly Powered by AbleSci AI